873 resultados para Exploit
Resumo:
The targeting of topically applied drug molecules into tissues below a site of application requires an understanding of the complex interrelationships between the drug, its formulation, the barrier properties of the skin, and the physiological processes occurring below the skin that are responsible for drug clearance from the site, tissue, and/or systemic distribution and eventual elimination. There is still a certain amount of controversy over the ability of topically applied drugs to penetrate into deeper tissues by diffusion or whether this occurs by redistribution in the systemic circulation. The major focus of our work in this area has been in determining how changes in drug structure and physicochemical properties, such as protein binding and lipophilicity, affect drug clearance into the local dermal microcirculation and lymphatics, as well as subsequent distribution into deeper tissues below an application site. The present study outlines our recent thinking on the drug molecule optimal physical attributes, in terms of plasma and tissue partitioning behaviour, that offer the greatest potential for deep tissue targeting. Drug Dev. Res. 46:309-315, 1999. (C) 1999 Wiley-Liss, Inc.
Resumo:
The recognition of microbial pathogens based on their molecular patterns is essential for host defense. Recently, Toll-like receptors have been shown not only to recognize viruses as well as bacteria and fungi, but also to trigger an efficient immune response. A recent publication proposed that the retrovirus mouse mammary tumor virus exploits the pattern-recognition receptor Toll-like receptor 4 to achieve more efficient infection.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
In this article we explore the NVIDIA graphical processing units (GPU) computational power in cryptography using CUDA (Compute Unified Device Architecture) technology. CUDA makes the general purpose computing easy using the parallel processing presents in GPUs. To do this, the NVIDIA GPUs architectures and CUDA are presented, besides cryptography concepts. Furthermore, we do the comparison between the versions executed in CPU with the parallel version of the cryptography algorithms Advanced Encryption Standard (AES) and Message-digest Algorithm 5 (MD5) wrote in CUDA. © 2011 AISTI.
Resumo:
Our study focuses on the question whether corporate insiders in Germany exploit inside information while trading in their company’s stock. In contrast to prior international studies, which are not able to link insider transactions to a formal definition of inside information, we relate insider transactions to subsequent releases of inside information via ad-hoc news disclosures. We find evidence that corporate insiders as a group seem to trade on inside information. Moreover, members of the supervisory board seem to be most active in exploiting inside information, since they realize exceptionally high profits with their frequent front-running transactions.
Resumo:
Cell wall deposition is a key process in the formation, growth, and differentiation of plant cells. The most important structural components of the wall are long cellulose microfibrils, which are synthesized by synthases embedded in the plasma membrane. A fundamental question is how the microfibrils become oriented during deposition at the plasma membrane. The current textbook explanation for the orientation mechanism is a guidance system mediated by cortical microtubules. However, too many contraindications are known in secondary cell walls for this to be a universal mechanism, particularly in the case of helicoidal arrangements, which occur in many situations. An additional construction mechanism involves liquid crystalline self-assembly [A. C. Neville (1993) Biology of Fibrous Composites: Development Beyond the Cell Membrane (Cambridge Univ. Press, Cambridge, U.K.)], but the required amount of bulk material that is able to equilibrate thermally is not normally present at any stage of the wall deposition process. Therefore, we have asked whether the complex ordered texture of helicoidal cell walls can be formed in the absence of direct cellular guidance mechanisms. We propose that they can be formed by a mechanism that is based on geometrical considerations. It explains the genesis of the complicated helicoidal texture and shows that the cell has intrinsic, versatile tools for creating a variety of textures. A compelling feature of the model is that local rules generate global order, a typical phenomenon of life.